Skip to main content
Share
Favorite

133
RESULTS

movies 132
texts 1
COLLECTION
TOPIC
IA32 133
OpenSecurityTraining.info 132
Intel 122
x86 122
Intel x86 107
Classes 85
Education 85
Multi-day-class 85
Multi-day-training 85
Technology 85
Training 85
Computer Security 84
Computers 73
Computer 72
reverse engineering 61
Computer security class 60
Cyber Security 60
CyberSecurity 60
Debugging 60
Disassembly 60
Host Security 60
IDA 60
IDA Pro 60
Reverse Engineering 60
Security 60
classes 47
computer 47
computer security 47
computer security class 47
computers 47
cyber security 47
education 47
host security 47
multi-day-class 47
multi-day-training 47
security 47
training 47
debugging 36
malware 35
Malware 26
Malware Analysis 26
Static Analysis 26
ASLR 25
Address Space Layout Randomization 25
DEP 25
Exploits 25
SEH 25
buffer overflows 25
smashing the stack 25
software vulnerabilities 25
disassembly 24
rootkits 24
EAT 23
Export Address Table 23
IAT 23
IAT hooking 23
Import Address Table 23
Import Address Table hooking 23
PE 23
PE/COFF 23
Portable Executable format 23
WinDbg 23
Windows PE 23
Windows executable 23
binaries 23
binary executable format 23
binary format 23
debugger 23
exports 23
forwarded exports 23
imports 23
x86 assembly 23
segmentation 14
Data Execution Prevention 13
SEHOP 13
SafeSEH 13
Vulnerabilities 13
bypassing ASLR 13
bypassing DEP 13
fuzzer 13
fuzzing 13
interrupts 13
memory management 13
paging 13
port IO 13
structured exception handling 13
DOS Header 12
File Header 12
Optional Header 12
Section Header 12
Structured Exception Handlers 12
Structured Exception Handling 12
TLS 12
Thread Local Storage 12
UPX 12
abstract assembly tree 12
abstract syntax tree 12
bound imports 12
compilation 12
compiler 12
compiling 12
computer virus 12
computer viruses 12
concrete syntax tree 12
context free grammars 12
data execution prevention 12
delayed imports 12
ebp overwrite 12
heap overflows 12
import by name 12
import by ordinal 12
lexing 12
linker 12
linking 12
load configuration 12
packers 12
packing 12
parse tree 12
parsing 12
relocatable code 12
relocations 12
resources 12
runtime imports 12
signed code 12
tokenizing 12
DKOM 11
Direct Kernel Object Manipulation 11
GMER 11
IDT 11
IDT hooking 11
IO Request Packets 11
IRP hooking 11
IRPs 11
Interrupt Descriptor Table 11
KOH 11
Kernel Object Hooking 11
MBR rootkit 11
Master Boot Record 11
SSDT 11
SSDT hooking 11
System Service Descriptor Table 11
Tuluka 11
VirusBlokAda 11
Volatility 11
Windows rootkits 11
bootkit 11
hacking 11
hooking 11
hooks 11
inline hooking 11
inline hooks 11
malware detection 11
memory forensics 11
rootkit 11
rootkit detection 11
rootkit detector 11
stealth malware 11
virtual memory 11
physical memory 10
CISC 1
Computers Security 1
L1 cache 1
L2 cache 1
RAID 1
RAM 1
RISC 1
VLIW 1
addressing modes 1
amdahl 1
assembler 1
cache memory 1
computer architecture 1
efficiency 1
instruction set 1
memory 1
parallelism 1
processor 1
reliability 1
storage sistems 1
superscalar 1
CREATOR
SHOW DETAILS